Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

or may be Great Firewall does it right :) Btw, can NSA splitters function as such as well? Or [selectively] replace real traffic with artificially generated one? (I mean pure splitter wouldn't, yet why it would be just a pure splitter? why limit themselves to read-only capabilities only? May sound like a new tin foil hat frontier for some ... yet i think we do need one at least as a guide post into the future as the reality has already moved well past the previous one)


http://www.wired.com/opinion/2013/11/this-is-how-the-interne...

Apparently there are malicious servers that do active attacks against Internet users (with forged injected traffic). I've seen no indication that the servers that carry out these attacks are directly related to the splitters.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: